ThreatMapper

ThreatMapper

Deepfence
+
+

Related Products

  • Chainguard
    49 Ratings
    Visit Website
  • Google Cloud Platform
    60,526 Ratings
    Visit Website
  • TeleRay
    6 Ratings
    Visit Website
  • Google Cloud Run
    325 Ratings
    Visit Website
  • Aikido Security
    224 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • Lenso.ai
    2 Ratings
    Visit Website
  • TelemetryTV
    275 Ratings
    Visit Website
  • MobiPDF (formerly PDF Extra)
    6,519 Ratings
    Visit Website
  • Picsart Enterprise
    27 Ratings
    Visit Website

About

Easily store, share, and deploy your container software anywhere. Push container images to Amazon ECR without installing or scaling infrastructure, and pull images using any management tool. Share and download images securely over Hypertext Transfer Protocol Secure (HTTPS) with automatic encryption and access controls. Access and distribute your images faster, reduce download times, and improve availability using a scalable, durable architecture. Amazon ECR is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. Meet your organization’s image compliance security requirements using insights from common vulnerabilities and exposures (CVEs) and the Common Vulnerability Scoring System (CVSS). Publish containerized applications with a single command and easily integrate your self-managed environments.

About

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

DevOps teams

Audience

Developers seeking a solution to scan and manage system vulnerabilities in running containers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Amazon
Founded: 1994
United States
aws.amazon.com/ecr/

Company Information

Deepfence
United States
deepfence.io/threatmapper/

Alternatives

Alternatives

ThreatStryker

ThreatStryker

Deepfence
Bytesafe

Bytesafe

Bitfront
Red Hat Quay

Red Hat Quay

Red Hat

Categories

Categories

Integrations

Amazon EKS
Amazon Web Services (AWS)
AWS Deep Learning Containers
AWS Marketplace
Alchemy
Amazon Elastic Container Registry (ECR)
Amazon Elastic Container Service (Amazon ECS)
Drone
Elasticsearch
GitHub
Harbor
Kubernetes
OpenShift Cloud Functions
Protegrity
Seeker
Slack
ThreatStryker
Uptycs
VMware Tanzu
Vanta

Integrations

Amazon EKS
Amazon Web Services (AWS)
AWS Deep Learning Containers
AWS Marketplace
Alchemy
Amazon Elastic Container Registry (ECR)
Amazon Elastic Container Service (Amazon ECS)
Drone
Elasticsearch
GitHub
Harbor
Kubernetes
OpenShift Cloud Functions
Protegrity
Seeker
Slack
ThreatStryker
Uptycs
VMware Tanzu
Vanta
Claim Amazon Elastic Container Registry (ECR) and update features and information
Claim Amazon Elastic Container Registry (ECR) and update features and information
Claim ThreatMapper and update features and information
Claim ThreatMapper and update features and information